Jade Helm as Itself a Psy Op

See Also: Cryptome

Jade Helm as Itself a Psy Op by Jay’s Analysis

Psychological Warfare Operations

Psychological warfare operations are at once mysterious, yet fairly well-known.  Most educated readers are familiar with World War II propaganda or the notion of “black operations,” but more precise and technical ideas of PsyOps are not as well known.   Retired Maj. Ed Rouse explains of the goals of PsyOps:

BAM!

BAM!

“Psychological Operations (PSYOP) or Psychological Warfare (PSYWAR) is simply learning everything about your target enemy, their beliefs, likes, dislikes, strengths, weaknesses, and vulnerabilities. Once you know what motivates your target, you are ready to begin psychological operations.

Psychological operations may be defined broadly as the planned use of communications to influence human attitudes and behavior … to create in target groups behavior, emotions, and attitudes that support the attainment of national objectives. The form of communication can be as simple as spreading information covertly by word of mouth or through any means of multimedia.

A psychological warfare campaign is a war of the mind. Your primary weapons are sight and sound. PSYOP can be disseminated by face-to-face communication, audio-visual means (television), audio media (radio or loudspeaker), visual media, (leaflet newspapers, books, magazines and/or posters). The weapon is not how its sent, but the message it carries and how that message affects the recipient.”

With that basic definition in mind, we can consider the possibility of Jade Helm 15 itself as having multiple potential uses.  Rather than the simple, binary dialectic of tyrannical fascist system versus liberty-loving, God-fearing patriot, the effect of Jade Helm 15’s “leak” upon the public and their reaction are far more interesting and relevant than the operation itself.   In fact, if we think back to recent years, alternative media outlets were in a tizzy over National Level Exercise 09, and then over NLE 11, etc.  In neither case did imminent apocalyptic doom manifest, but what did occur was a labyrinth of fractal speculation and orgiastic frenzy of bloggers, YouTubers and eschatological doomsayers, as these “leaked” exercises took on a life of their own.

From the perspective of PsyOps, the potential of Jade Helm to “learn everything about your target enemy, their beliefs, their likes, dislikes, strengths, weaknesses,” etc., would thus have numerous applications here.  On one level, the inter-contextual dialectic of tyrannical military versus veterans and patriots is the out playing of the intended war gaming scenario.

Multi-level Game Theory and Algorithmic Tracking

On a higher, meta level, the intention is to gather game theory-style data on the target audience, which in this case is not merely the alternative media and tea party niche, but also the mainstream media and its response to the tea party response, and back and forth.  Like a game of Pong, the game theorist can sit back and watch mass trends, movements and reactions between these two sides with social media and search engine algorithmic tracking.

Titan Supercomputer.

Titan Supercomputer.

For example, a Raleigh-based firm boasts of its ability to track “suicide bombing” with its collection of Pakistani bombing information.  WNCN reports:

“In analyzing the information, they realized that they have the blast signatures for the terrorist organizations. “I can tell you who did the attack with 93 percent accuracy, based on the way they make the bombs,” Usamani said.  They looked at what they call geo-political indicators, which includes things like political events, weather patterns, even the date on the calendar.  Burns said there are more than 150 such indicators. “You have to combine all of those,” he said. “You have to determine which combination is going to develop the risks for a particular area.”

Despite limitations in this type of software, numerous companies have arisen with the technological capability to offer some form of predictive algorithm programs to service law enforcement and intelligence agencies in “pre-crime.”  One of the many goals of Jade Helm style operations that are consistent, ongoing military praxis would be the overcoming of these limitations and moving closer to the unachievable accuracy of 100%.

In other words, perfection, or the nearest thing to, requires a lot of practice.  Jade Helm is therefore an exercise that is far more relevant for data collection in terms of risk management and game theory for intelligence agencies and front tech companies, than anything to do with martial law, imminent gun confiscation or the blood moon asteroid crashing into the Wal-Mart turned FEMA camp guillotine gulag.

In the wake of ongoing exposure of mainstream media’s consistent usage of staged, faked, and computer-generated “news,”  alternative media outlets and consumers should be reminded of the possibility of alternative media falling into this same pattern of sensationalizing and disregarding facts for ever increasingly clickbait, tabloid-style online media gimmickry in both alternative and mainstream sources.

When considering the possibility of large-scale psychological operations in relation to purported “leaks” and “whistleblowers” who become the darlings of mainstream media and begin negotiating book and movie deals,

If the military wanted to keep Jade Helm secret, it could have been kept secret.  The decision to run a mass drill in several states was intentionally done and purposefully allowed to “leak.”  The consequences of such a public revelation are much more useful for war gaming and future predictive responses than any imminent threat of martial law.  Just like Assange and Snowden, Jade Helm is the establishment’s middle finger in the face of the ridiculous naiveté of the Tea Party crowd.

Read More:

See also:

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s